:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DRQEEKZ2WBDUHD54HOC25QZNPQ.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DRQEEKZ2WBDUHD54HOC25QZNPQ.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/KLKSFR64DFER3LI5P25P3QA4YU.jpg)
How IT modernization can ‘future proof’ NATO
Baking security into applications undergirding the infrastructure of NATO’s IT will help ensure superior logistics, communications and force projection.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DWPJ5W3JRFCVHOS57GLGU2BS7M.jpg)
Thought Leadership
How to help Kyiv go on a drone offensive
Russia and Iran are planning to build a factory within Russia to produce thousands of Shahed-136 drones.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/6S75RUNRBNH3LL6Q3XRSHXG3FY.jpg)
The Pentagon must make a culture shift to embrace innovation
A culture of innovation is fundamental to acquiring, adopting and scaling new technologies that will give our men and women in uniform the advantage.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WXVIJLL7IBHTZAHBV5NQLHTO4Y.jpg)
Managing security across the new data perimeter
If the network perimeter was like a protective moat that surrounds a castle, the data perimeter is the small houses that dot the landscape.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MLFYUBX6URB6DK6WC22CU3JXVE.jpg)
Is 2023 the year you become a government contractor?
The federal government spent around $637 billion on contracts in fiscal year 2022, including those covering professional support services.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZZPELYTAY5DWDFIRYSIITDLIFQ.jpg)
Software Bill of Materials is the key to cybersecurity compliance
SBOMs can be a valuable tool to identify and address potential security challenges.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/I3LF2EEUXJAZDLYBYG74FTPTCQ.jpg)
US foreign military sales process needs better communication
Allied nations often don’t know what they need to solve their problem or what the U.S. has to offer.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/UKHBF5ELIBBQJBVHXGEUYNQSII.jpg)
Pentagon must act now on quantum computing or be eclipsed by rivals
The battle for quantum supremacy is already under way, and is set to fundamentally change the defense sector .
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HTO5HQZJZFVRBLBUUFX55DGUU.jpg)
Three ways to build on DISA’s strong data strategy
DISA’s IPlan is a solid step forward for guiding internal data practices, providing insights and goals to reduce data silos.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/W5RQAJKONZAQJA5ASS6PHDMY3Q.jpg)
More can be done to ban US government use of Chinese drones
The U.S. national security community must eschew companies and supply chains controlled by the Chinese Communist Party.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5NPKFVEN3VHCZEGMUYHDZQMGNI.jpg)
How big of a fleet? A look at the US Navy’s size and readiness needs
Absent the personnel and support needed, additional ships could spend more time at the piers and be less capable at sea.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/7DGID34ZMFG6HBBRLE7NR5MD2Y.jpg)
US can strengthen security by developing domestic rare earth resources
In the long term, the status quo around critical materials is unacceptable since it gives China a “kill switch” for America’s defense manufacturing.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PLLR4FOEABA4HKU6C2ZRVGHNGA.jpg)
Washington is waking up on weapons for Taiwan
The legislation includes much-needed guidance to the U.S. Defense and State Departments to prioritize the delivery of arms to Taiwan.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4MW46AVAD5HMHBTZZ6H3VOTH3Y.jpg)
Pentagon’s Office of Strategic Capital must win over Silicon Valley
The U.S. is doubling down on industrial goals, aiming to increase its role in the national security ecosystem and diminish that of its competitors.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HU66P6LCNZDQTDP6X26I7GPHDI.jpg)
An open call to the visionaries in government to change DoD culture
Are we willing to let go of the culture and policies that stifle significant progress in advancing military capability?
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Pentagon, private sector must partner to fight new era of cyberattacks
Over the past six months, there have been 10,666 ransomware variants identified, almost twice the total in the previous six months.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/VHTMTOG22JDBDBFDP36XJ4PD7I.jpg)
White House AI ‘Bill of Rights’ may risk national security
Privacy-Preserving Machine Learning may address core concerns of the blueprint without slowing the pace of U.S. innovation
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XXWK2JCWI5HOBDYNXX2477F6NQ.jpg)
DISA’s ‘Gray Network’ faces performance monitoring challenges
Gray networks sit between inner and outer VPN tunnels and provide an extra layer of security for encrypted classified data.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MFAKL5RQIVBQVJV6Z2E4IYYNCA.jpg)